Key-aggregate cryptosystem for scalable data sharing in cloud storage CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng IEEE transactions on parallel and distributed systems 25 (2), 468-477, 2013 | 472 | 2013 |
Identity-based proxy re-encryption without random oracles CK Chu, WG Tzeng International Conference on Information Security, 189-202, 2007 | 308 | 2007 |
Conditional proxy re-encryption secure against chosen-ciphertext attack J Weng, RH Deng, X Ding, CK Chu, J Lai Proceedings of the 4th international symposium on information, computer, and …, 2009 | 269 | 2009 |
Conditional proxy broadcast re-encryption CK Chu, J Weng, SSM Chow, J Zhou, RH Deng Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009 | 176 | 2009 |
Dynamic secure cloud storage with provenance SSM Chow, CK Chu, X Huang, J Zhou, RH Deng Cryptography and Security: From Theory to Applications: Essays Dedicated to …, 2012 | 161 | 2012 |
Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries CK Chu, WG Tzeng Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005 | 148 | 2005 |
Security concerns in popular cloud storage services CK Chu, WT Zhu, J Han, JK Liu, J Xu, J Zhou IEEE pervasive computing 12 (4), 50-57, 2013 | 123 | 2013 |
Time-bound anonymous authentication for roaming networks JK Liu, CK Chu, SSM Chow, X Huang, MH Au, J Zhou IEEE Transactions on Information Forensics and Security 10 (1), 178-189, 2014 | 70 | 2014 |
Practical ID-based encryption for wireless sensor network CK Chu, JK Liu, J Zhou, F Bao, RH Deng Proceedings of the 5th ACM symposium on information, computer and …, 2010 | 65 | 2010 |
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts K Liang, CK Chu, X Tan, DS Wong, C Tang, J Zhou Theoretical Computer Science 539, 87-105, 2014 | 50 | 2014 |
CloudHKA: A cryptographic approach for hierarchical access control in cloud computing YR Chen, CK Chu, WG Tzeng, J Zhou Applied Cryptography and Network Security: 11th International Conference …, 2013 | 42 | 2013 |
Efficient k-out-of-n Oblivious Transfer Schemes. CK Chu, WG Tzeng J. Univers. Comput. Sci. 14 (3), 397-415, 2008 | 40 | 2008 |
Privacy-preserving smart metering with regional statistics and personal enquiry services CK Chu, JK Liu, JW Wong, Y Zhao, J Zhou Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 39 | 2013 |
Verifier-local revocation group signatures with time-bound keys CK Chu, JK Liu, X Huang, J Zhou Proceedings of the 7th ACM symposium on information, computer and …, 2012 | 39 | 2012 |
A threshold GQ signature scheme LS Liu, CK Chu, WG Tzeng Applied Cryptography and Network Security: First International Conference …, 2003 | 19 | 2003 |
Identity-based server-aided decryption JK Liu, CK Chu, J Zhou Australasian Conference on Information Security and Privacy, 337-352, 2011 | 14 | 2011 |
Optimal resilient threshold GQ signatures CK Chu, WG Tzeng Information sciences 177 (8), 1834-1851, 2007 | 13 | 2007 |
A note on multiple error detection in ASCII numeric data communication CK Chu Journal of the ACM (JACM) 28 (2), 265-269, 1981 | 11 | 1981 |
Secure mobile subscription of sensor-encrypted data CK Chu, WT Zhu, SSM Chow, J Zhou, RH Deng Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 9 | 2011 |
Identity-committable signatures and their extension to group-oriented ring signatures CK Chu, WG Tzeng Australasian Conference on Information Security and Privacy, 323-337, 2007 | 9 | 2007 |